Earth is a common expression for the planet earth in a number of countries and regions, which reflects the interdependence that exists among human beings, other living species and the planet we all inhabit. The Earth and its ecosystems are our home. In order to achieve a just balance among the economic, social, and environmental needs of present and future generations, it is necessary to promote harmony with nature and the Earth. International...

No Comments munishmishra04_3od47tgp Read More

Electronic mail is the core of modern communications. People rely on email to conduct their business and stay in touch with families. The ubiquity of an email availability is one of the strengths of the internet whose phenomenal growth and popularity are also due to the popularity of an email. E-mail system has become the most popular computer based method used to send and receive E-mail messages between the network clients inside or outside t...

No Comments munishmishra04_3od47tgp Read More

Databases fulfill several roles in the process of building computer applications. Like a file system, databases provide the means to store data between invocations of an application (i.e. persistence). Database systems, however, provide additional services not supported by most, if not all, file systems. History of data processing goes through many different changes with different technologies along with the time. In decade there is huge incre...

No Comments munishmishra04_3od47tgp Read More

Today, the web users surf many different websites regularly in the course of their daily lives. The usability and conversion rate of a website reflect the kind of experience the web users have on the website. The success of a website rides on the usability and conversion rate of the website. The higher the usability and conversion rate of the website, the better the website is functioning. Web analytics consists of a series of metrics and tech...

No Comments munishmishra04_3od47tgp Read More

The life and activities of every great thinker or activist, depend to a great extent on the various problematic conditions under which he/she lives and works and struggles to bring about desired changes. In the case of Ambedkar, this societal relationship is far more evident, as he was born in a community which, for centuries, had been subjected to deprivations, miseries, humiliations, oppression’s and denials in every worthy aspect of h...

No Comments munishmishra04_3od47tgp Read More

The need for network security is a relatively new requirement. Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security industry standards, as mechanisms of protection and prevention,...

Virtual Reality is a major asset and aspect of our future. It is the key to experiencing, feeling and touching the past, present and the future. It is the medium of creating our own world, our own customized reality. Modeling is used to build structures that serve as proxies for other objects. Virtual reality is more than just interacting with 3D worlds. By offering presence simulation to users as an interface metaphor, it allows operators to ...

No Comments munishmishra04_3od47tgp Read More

The exponential growth of the technological advancements has resulted in high-resolution devices, such as digital cameras, scanners, monitors, and printers, which enable the capturing and displaying of multimedia data in high-density storage devices. Furthermore, more and more applications need to live with multimedia data. However, the gap between the characteristics of various media types and the application requirements has created the need...

No Comments munishmishra04_3od47tgp Read More

There has been a remarkable growth in the field of wireless communication standards. Wireless networks are becoming popular as they allow users, the ability to remain connected while on the move.  These wireless standards are characterized based on their range, maximum signal rate, number of channels, channel bandwidth, data protection, frequency band, Quality of Service (QoS) and applications. Overview of HiperLan HIPERLAN is a European (ETSI...

No Comments munishmishra04_3od47tgp Read More

Cryptographic hash functions cannot be thought of outside mathematics. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages; data integrity verification which prevents modification of data from going undetected, time stamping and digital signature scheme. The hash functions that are used in various security related applicat...

No Comments munishmishra04_3od47tgp Read More
Happy Earth Day
Culture , History / April 22, 2018

Earth is a common expression for the planet earth in a number of countries and regions, which reflects the interdependence that exists among human beings, other living species and the planet we all inhabit. The Earth and its ecosystems are our home. In order to achieve a just balance among the economic, social, and environmental needs of present and future generations, it is necessary to promote harmony with nature and the Earth. Int...

What is Post office protocol 3 (POP3)?
Networking , Technology & Science / April 21, 2018

Electronic mail is the core of modern communications. People rely on email to conduct their business and stay in touch with families. The ubiquity of an email availability is one of the strengths of the internet whose phenomenal growth and popularity are also due to the popularity of an email. E-mail system has become the most popular computer based method used to send and receive E-mail messages between the network clients inside or...

What is Object Oriented Database?
Database , Technology & Science / April 20, 2018

Databases fulfill several roles in the process of building computer applications. Like a file system, databases provide the means to store data between invocations of an application (i.e. persistence). Database systems, however, provide additional services not supported by most, if not all, file systems. History of data processing goes through many different changes with different technologies along with the time. In decade there is ...

What is Web Analytics in Big Data Analytics?
Big Data , Technology & Science / April 15, 2018

Today, the web users surf many different websites regularly in the course of their daily lives. The usability and conversion rate of a website reflect the kind of experience the web users have on the website. The success of a website rides on the usability and conversion rate of the website. The higher the usability and conversion rate of the website, the better the website is functioning. Web analytics consists of a series of metric...

Dr B.R. Ambedkar (14th April 1891 – 6th December 1956)
History / April 14, 2018

The life and activities of every great thinker or activist, depend to a great extent on the various problematic conditions under which he/she lives and works and struggles to bring about desired changes. In the case of Ambedkar, this societal relationship is far more evident, as he was born in a community which, for centuries, had been subjected to deprivations, miseries, humiliations, oppression’s and denials in every worthy a...

What is Access Control in Network?

The need for network security is a relatively new requirement. Security incidents are rising at an alarming rate every year. As the complexity of the threats increases, so do the security measures required to protect networks. Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security industry standards, as mechanisms of protection and p...

What is Virtual Reality in Computer Graphics?

Virtual Reality is a major asset and aspect of our future. It is the key to experiencing, feeling and touching the past, present and the future. It is the medium of creating our own world, our own customized reality. Modeling is used to build structures that serve as proxies for other objects. Virtual reality is more than just interacting with 3D worlds. By offering presence simulation to users as an interface metaphor, it allows ope...

What is Multimedia Database in Computer Graphics?

The exponential growth of the technological advancements has resulted in high-resolution devices, such as digital cameras, scanners, monitors, and printers, which enable the capturing and displaying of multimedia data in high-density storage devices. Furthermore, more and more applications need to live with multimedia data. However, the gap between the characteristics of various media types and the application requirements has create...

What is HIPERLAN in Wireless Network?
Networking , Technology & Science / April 8, 2018

There has been a remarkable growth in the field of wireless communication standards. Wireless networks are becoming popular as they allow users, the ability to remain connected while on the move.  These wireless standards are characterized based on their range, maximum signal rate, number of channels, channel bandwidth, data protection, frequency band, Quality of Service (QoS) and applications. Overview of HiperLan HIPERLAN is a Euro...

What is Secure Hash Algorithm (SHA) in Network Security

Cryptographic hash functions cannot be thought of outside mathematics. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages; data integrity verification which prevents modification of data from going undetected, time stamping and digital signature scheme. The hash functions that are used in various security relate...

Insert math as
Block
Inline
Additional settings
Formula color
Text color
#333333
Type math using LaTeX
Preview
\({}\)
Nothing to preview
Insert